Yong Ho Hwang

According to our database1, Yong Ho Hwang authored at least 36 papers between 2003 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
UTopia: Automatic Generation of Fuzz Driver using Unit Tests.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023

2022
On Data Licenses for Open Source Threat Intelligence.
IEEE Secur. Priv., 2022

2021
#Twiti: Social Listening for Threat Intelligence.
Proceedings of the WWW '21: The Web Conference 2021, 2021

2020
Cybersecurity Event Detection with New and Re-emerging Words.
Proceedings of the ASIA CCS '20: The 15th ACM Asia Conference on Computer and Communications Security, 2020

2015
Fast Order-Preserving Encryption from Uniform Distribution Sampling.
Proceedings of the 2015 ACM Workshop on Cloud Computing Security Workshop, 2015

IoT Security & Privacy: Threats and Challenges.
Proceedings of the 1st ACM Workshop on IoT Privacy, Trust, and Security, 2015

2014
Encrypted Keyword Search Mechanism Based on Bitmap Index for Personal Storage Services.
Proceedings of the 13th IEEE International Conference on Trust, 2014

2008
Certificateless Public Key Encryption Secure against Malicious KGC Attacks in the Standard Model.
J. Univers. Comput. Sci., 2008

Key-Frame Selection and an LMedS-Based Approach to Structure and Motion Recovery.
IEICE Trans. Inf. Syst., 2008

2007
Using Irradiance Environment Map on GPU for Real-Time Composition.
Proceedings of the Advances in Multimedia Information Processing, 2007

Public Key Encryption with Conjunctive Keyword Search and Its Extension to a Multi-user System.
Proceedings of the Pairing-Based Cryptography, 2007

Using Camera Calibration and Radiosity on GPU for Interactive Common Illumination.
Proceedings of the Advances in Multimedia Modeling, 2007

Contour Matching in Omnidirectional Images.
Proceedings of the Advances in Visual Computing, Third International Symposium, 2007

2006
Calibration of Omnidirectional Camera by Considering Inlier Distribution.
Proceedings of the Rough Sets and Current Trends in Computing, 2006

Quantitative Measure of Inlier Distributions and Contour Matching for Omnidirectional Camera Calibration.
Proceedings of the Advances in Multimedia Information Processing, 2006

Omnidirectional Camera Calibration and 3D Reconstruction by Contour Matching.
Proceedings of the Advances in Visual Computing, Second International Symposium, 2006

Efficient Public Key Broadcast Encryption Using Identifier of Receivers.
Proceedings of the Information Security Practice and Experience, 2006

Reconstructing Illumination Environment by Omnidirectional Camera Calibration.
Proceedings of the AI 2006: Advances in Artificial Intelligence, 2006

2005
Efficient Broadcast Encryption Scheme with Log-Key Storage.
IACR Cryptol. ePrint Arch., 2005

Image-Based Relighting in Dynamic Scenes.
Proceedings of the Advances in Multimedia Information Processing, 2005

Timed-Release Encryption with Pre-open Capability and Its Application to Certified E-mail System.
Proceedings of the Information Security, 8th International Conference, 2005

3D Reconstruction Based on Invariant Properties of 2D Lines in Projective Space.
Proceedings of the Advances in Intelligent Computing, 2005

Using Projective Invariant Properties for Efficient 3D Reconstruction.
Proceedings of the Image and Video Retrieval, 4th International Conference, 2005

2004
Practical Pay-TV Scheme Using Traitor Tracing Scheme for Multiple Channels.
Proceedings of the Information Security Applications, 5th International Workshop, 2004

Using Factorization Algorithm for 3D Reconstruction over Long Un-calibrated Sequences.
Proceedings of the PRICAI 2004: Trends in Artificial Intelligence, 2004

Structure and Motion Recovery Using Two Step Sampling for 3D Match Move.
Proceedings of the MICAI 2004: Advances in Artificial Intelligence, 2004

An Improved ICP Algorithm Based on the Sensor Projection for Automatic 3D Registration.
Proceedings of the MICAI 2004: Advances in Artificial Intelligence, 2004

Two Methods for Automatic 3D Reconstruction from Long Un-calibrated Sequences.
Proceedings of the Intelligent Data Engineering and Automated Learning, 2004

Frame Grouping Measure for Factorization-Based Projective Reconstruction.
Proceedings of the 17th International Conference on Pattern Recognition, 2004

View Morphing Based on Auto-calibration for Generation of In-between Views.
Proceedings of the Computational Science and Its Applications, 2004

Bit-Serial Multipliers for Exponentiation and Division in GF(2<sup>m</sup>) Using Irreducible AOP.
Proceedings of the Computational Science and Its Applications, 2004

An Efficient Revocation Scheme for Stateless Receivers.
Proceedings of the Public Key Infrastructure, 2004

TTS without Revocation Capability Secure Against CCA2.
Proceedings of the Information Security and Privacy: 9th Australasian Conference, 2004

2003
An Efficient Public Key Trace and Revoke Scheme Secure against Adaptive Chosen Ciphertext Attack.
Proceedings of the Advances in Cryptology - ASIACRYPT 2003, 9th International Conference on the Theory and Application of Cryptology and Information Security, Taipei, Taiwan, November 30, 2003

EPA: An Efficient Password-Based Protocal for Authenticated Key Exchange.
Proceedings of the Information Security and Privacy, 8th Australasian Conference, 2003

An Efficient Revocation Scheme with Minimal Message Length for Stateless Receivers.
Proceedings of the Information Security and Privacy, 8th Australasian Conference, 2003


  Loading...